Geek vs. Geek – Disco ist eines von drei Videos, die auf der Novell BrainShare in Salt Lake City (Beginn: 22. März 2010) gezeigt wurden. Das unterhaltsame Video dient lediglich dem Zweck, die Aufmerksamkeit auf das Wort „Intelligent“ zu lenken, das ein wichtiger Bestandteil der von Novell angebotenen Intelligent Workload Management-Produktreihe ist. Für Produktion und Regie zeichnen Blufire Studios, Russ Dastrup und Troy Monney verantwortlich.
The Hastings & Prince Edward Counties Health Unit had to migrate the workloads of 40 virtual servers to a new data center with a minimum of downtime. After looking at various server migration tools, the Health Unit decided to do the server migration with PlateSpin Migrate, because of the real-time block level replication and the possibility to do live migrations.
As a result the Health Unit migrated the workloads of 40 servers with only 2-3 minutes downtime per server. "With PlateSpin Migrate the data center migration project went quickly, efficiently and most importantly successfully" said Tom Lockhart, IT Systems Manager from Hastings & Prince Edward Counties Health Unit.
Today’s IT world is complex. An enterprise has hundreds, if not thousands, of critical components needed to deliver the services the business relies on. The job of IT professionals is to make sure it’s all up and running, performing as expected, and delivering critical IT and business services. AppManager is the monitoring tool that meets all your monitoring needs, as well as easily expands to include UC/VoIP monitoring, IT process automation, and more!
Identity Manager Home is a new end user interface for Identity Manager. This demo guides you through the simple steps an average end user can use to find a resource that they need to do their job, initiate a request for access to those resources and see what they already have and the status of their requests. It also outlines how end users' management can review and approve those requests.
PlateSpin Protect is a disaster recovery software product that uses virtual infrastructure capacity to protect both physical and virtual workloads. It can deliver mirroring-like RTO and RPO performance at a price point approaching tape.
Your IT environment is constantly changing. You need good ways to understand and report on its behaviors to understand trends and predict when you'll need more storage, bandwidth, memory or processing power. Additionally, because your IT environment is in flux—you should be able to recognize it's normal and expected behaviors so you only get alerted about anomalous or unexpected situations—making alerts more meaningful. The AppManager Reporting and Analytics Add-on can help!
Analysis Center 2.7 automatically collects and stores metrics in a data warehouse and distributes pre-defined reports on schedule or on demand. Now is the time to take advantage of the full cost-savings benefits of Analysis Center by migrating to this latest version.
In this webcast, "Deploying AppManager in the Real World" you will learn how to maintain accurate monitoring so that information gaps do not develop, while making it easier to collect the events and data you need to keep your IT systems and applications performing at their best.
Softcat is a leading provider of software licensing, hardware, security and related IT services based in London. Softcat's managed service business runs from two datacentres in London and Manchester; this includes their cloud service platform: Cloud Softcat. They have also recently invested in their Network Operations Centres in Marlow and Manchester.
Recorded live at BrainShare 2013 with speaker Carolyn McClain. Cloud Security Services is a series of product offerings designed with multi-tenant management and per-tenant usage-based billing. Cloud Security Services fits comfortably in a public cloud and has the ability to support a mix of cloud and enterprise deployment schemes. During this session you will see the latest service offerings, review deployment scenarios and have the opportunity to hear cloud service provider experiences.
Sam's boss, the CIO, wants to transition to Microsoft Office 365. But, he doesn't realize how the complexity it introduces to their environment impacts their user's single sign on experience. Sam, the IT Admin, has to figure it out -- and she does. Sam discovers CloudAccess and how it makes single sign on easy; especially compared to implementing and maintaining Microsoft's Active Directory Federation Services.
Identity Manager Home allows your average end users to find a resource that they need to do their job, initiate a request for access to those resources and see what they already have and the status of their requests. The end users' management is able to review and approve those requests.
Justin Taylor talks to Jon Hardman about CloudAccess and what differentiates it. Jon demos how CloudAccess looks to the end-user, plus installing, adding a new service, and rolling that service out to users.
Hastings and Prince Edward Counties chose PlateSpin Forge because it was available as a fully configured hardware appliance, ready to do the data protection that they needed. It took just half an hour to get PlateSpin Forge up and running. They have had to use their Disaster Recovery solution twice, and both times it worked perfectly.
Tieto, a leading European IT service company, has chosen our technology as the basis of its cloud-based data centre services. As a result of this partnership, Tieto offers a full Cloud Services portfolio—delivered at the speed and flexibility of the public cloud—that can meet the unique needs of its growing northern European customer base with the consistent and integrated service customers have come to expect.
Most enterprises focus their security strategies-and their security monitoring practices-on the risks posed by end users, customers, and/or business partners. But such strategies may overlook one huge source of risk: the IT department itself. Every day, IT staffers make changes to systems access controls, firewall settings, router port configurations, and many other administrative tools that may impact the security posture of the organization. How can enterprises be certain that these everyday changes don't leave their systems and data open to attack? In this webcast, a top expert in security research and administration will discuss the common mistakes enterprises make in change and configuration management, and how to ensure that these mistakes don't lead to unexpected security compromises.
The Central Denmark Region (Region Midtjylland / MIDT) is one of five administrative regions in Denmark. The administration's main responsibility is providing healthcare services to the region's 1.2 million inhabitants.
Community Health Systems, Inc. (CHS) is one of the USA’s leading operators of general acute care hospitals; operating 158 hospitals in 22 states with approximately 27,000 licensed beds. They needed to manage and secure digital identities for 280,000 users in their ever-changing and growing healthcare environment, without compromising patient care. Working with GCA Technology Solutions they deployed NetIQ Identity Manager to create a robust and secure automated user provisioning and single sign-on environment.